Sciweavers

1622 search results - page 265 / 325
» A Collection of Definitions of Intelligence
Sort
View
IEEEIAS
2009
IEEE
15 years 11 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
AGS
2009
Springer
15 years 11 months ago
Design of a Decision Maker Agent for a Distributed Role Playing Game - Experience of the SimParc Project
This paper addresses an ongoing experience in the design of an artificial agent taking decisions in a role playing game populated by human agents and by artificial agents. At fi...
Jean-Pierre Briot, Alessandro Sordoni, Eurico Vasc...
CIKM
2009
Springer
15 years 11 months ago
Topic and keyword re-ranking for LDA-based topic modeling
Topic-based text summaries promise to help average users quickly understand a text collection and derive insights. Recent research has shown that the Latent Dirichlet Allocation (...
Yangqiu Song, Shimei Pan, Shixia Liu, Michelle X. ...
CIKM
2009
Springer
15 years 11 months ago
A machine learning approach for improved BM25 retrieval
Despite the widespread use of BM25, there have been few studies examining its effectiveness on a document description over single and multiple field combinations. We determine t...
Krysta Marie Svore, Christopher J. C. Burges
ECSQARU
2009
Springer
15 years 11 months ago
Local Computation Schemes with Partially Ordered Preferences
Many computational problems linked to reasoning under uncertainty can be expressed in terms of computing the marginal(s) of the combination of a collection of (local) valuation fun...
Hélène Fargier, Nic Wilson